27.12.2014 Views

Strategic Thought Transformation - The IIPM Think Tank

Strategic Thought Transformation - The IIPM Think Tank

Strategic Thought Transformation - The IIPM Think Tank

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

I N D U S T R I A L E S P I O N A G E<br />

Knowledge of Foreign Entity: In the<br />

family model, the “spy” almost certainly<br />

knows the nationality of the foreign entity,<br />

but not necessarily the actual identity of<br />

the final consumer of the information. In<br />

addition, there is no indication yet that the<br />

overseas acquisition manager is required<br />

to use a cutout manager.<br />

Payments <strong>The</strong> record seems to indicate<br />

that in some cases, a significant amount of<br />

money is paid. In other cases, the “service”<br />

is redeemed for privileges given to the extended<br />

family in the home country.<br />

2.3 Use of “Front” Companies &<br />

Organizations<br />

In many cases, the overseas acquisition<br />

manager [or group] engages in setting up<br />

so-called “front” companies in order to provide<br />

a base of operations for their illicit<br />

activities. In many western countries, it is<br />

quite easy to set up a “company”. It requires<br />

only payment of a small registration fee<br />

and a little bit of paperwork.<br />

One famous Russian spy, Richard Sorge,<br />

set up a company in Japan that had imported<br />

technology from Germany capable<br />

of making copies of blueprints. 10 Not only<br />

Russian spy,<br />

Richard Sorge, set<br />

up a company that<br />

had technology<br />

capable of making<br />

copies of<br />

blueprints<br />

was this operation highly profitable, but<br />

at the same time it allowed Sorge & Co.<br />

to make copies of thousands of technical<br />

engineering drawings brought in for copying.<br />

<strong>The</strong> stolen information subsequently<br />

was put on to microfilm, and through a<br />

network of couriers based in Shanghai<br />

found its way to Moscow. 11<br />

Front companies provide a buffer between<br />

the overseas acquisition manager and the<br />

various recruited “spies” supplying the<br />

stolen information. Front companies have<br />

several advantages:<br />

Legitimacy: Since these companies are<br />

incorporated in the same country as the<br />

target company, there is an aura of legitimacy<br />

in their business dealings.<br />

Hidden Ownership: Although these<br />

companies are controlled from overseas,<br />

either<br />

1. Directly from the acquisition agency,<br />

or<br />

2. Through the overseas acquisition manager<br />

[who in turn is directly controlled<br />

from the home country], it is difficult<br />

for the target company to discover<br />

these relationships.<br />

Hidden Control: In many cases, these<br />

front companies are set up in a way in<br />

which although they are in fact conducting<br />

legitimate and real business, the actual control<br />

of them is behind the scenes, exercised<br />

indirectly in a way so that their corporate<br />

leadership itself may not be aware of the<br />

true nature of the business. In this type of<br />

arrangement, the front company serves as a<br />

“shell” or “launching point” for conducting<br />

other operations.<br />

Relationship Complexity: Different<br />

from “consulting companies”, “market research<br />

firms” and other information cockroaches<br />

on the market, front companies are<br />

able to establish with the target company<br />

highly complex relationships and fake negotiations<br />

that are intended only to pump<br />

for information. Examples include:<br />

1. Joint venture discussions.<br />

2. Overseas “sales” relationships.<br />

3. Outsourcing of manufacturing [to the<br />

10<br />

Blueprint: A blueprint is a plan or design documenting an architecture or an engineering design. <strong>The</strong> name comes from the photographic print, obtained through the cyanotype<br />

process, which is composed of white lines on a blue background commonly used in the past for copying architectural plans and engineering drawings. Source: Wikipedia.<br />

11<br />

<strong>The</strong> Sorge network by any standard was one of the most successful operations ever. Not only highly effective, but clever. A somewhat similar operation was carried out by the Israelis<br />

in Switzerland. Technical drawings of the new French Mirage jet fighter aircraft were sent to Israel and used to create the Kfir fighter jet. Only the Israelis did it even better. <strong>The</strong>y<br />

managed to take the originals of the engineering drawings and replace them with copies. <strong>The</strong>re is coverage of this in the book Every Spy a Prince by Raviv and Melman [13].<br />

An <strong>IIPM</strong> Intelligence Unit Publication 31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!